Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3856

Опубликовано: 07 янв. 2011
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 7.2

Описание

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

DNE

jaunty

DNE

karmic

released

2.10.1-0ubuntu18
lucid

released

2.11.1-0ubuntu7.5
maverick

released

2.12.1-0ubuntu8
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

hardy

released

2.7-10ubuntu7
jaunty

released

2.9-4ubuntu6.3
karmic

DNE

lucid

DNE

maverick

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 90%
0.06037
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

nvd
больше 14 лет назад

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

debian
больше 14 лет назад

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.1 ...

github
около 3 лет назад

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

oracle-oval
больше 14 лет назад

ELSA-2010-0793: glibc security update (IMPORTANT)

EPSS

Процентиль: 90%
0.06037
Низкий

7.2 High

CVSS2